hit counter script

Access The Ftd And Fxos Cli - Cisco Firepower 1010 Getting Started Manual

Hide thumbs Also See for Firepower 1010:
Table of Contents

Advertisement

Firepower Threat Defense Deployment with FDM
• Access Control—Use the access control policy to determine which connections are allowed on the
• Intrusion—Use the intrusion policies to inspect for known threats. Although you apply intrusion policies
The following example shows how to allow traffic between the inside-zone and dmz-zone in the access control
policy. In this example, no options are set on any of the other tabs except for Logging, where At End of
Connection is selected.
Figure 36: Access Control Policy
Step 6
Choose Device, then click View Configuration in the Updates group and configure the update schedules for
the system databases.
If you are using intrusion policies, set up regular updates for the Rules and VDB databases. If you use Security
Intelligence feeds, set an update schedule for them. If you use geolocation in any security policies as matching
criteria, set an update schedule for that database.
Step 7
Click the Deploy button in the menu, then click the Deploy Now button (
the device.
Changes are not active on the device until you deploy them.

Access the FTD and FXOS CLI

Use the command-line interface (CLI) to set up the system and do basic system troubleshooting. You cannot
configure policies through a CLI session. You can access the CLI by connecting to the console port.
You can also access the FXOS CLI for troubleshooting purposes.
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering.
using access control rules, you can edit the intrusion policies to selectively enable or disable specific
intrusion rules.
Access the FTD and FXOS CLI
), to deploy your changes to
Cisco Firepower 1010 Getting Started Guide
81

Advertisement

Table of Contents
loading

Table of Contents